What Can Go Wrong In Automotive


Semiconductor Engineering sat down to discuss automotive engineering with Jinesh Jain, supervisor for advanced architectures in Ford’s Research and Innovation Center in Palo Alto; Raed Shatara, market development for automotive infotainment at [getentity id="22331" comment="STMicroelectronics"]; Joe Hupcey, verification product technologist at [getentity id="22017" e_name="Mentor Graphics"]; ... » read more

Using Formal Verification To Prevent Catastrophic Security Breaches


The news of last week’s Yahoo hack that affected 500-million or so users sent shock waves of anxiety far and wide. It’s not clear yet how the massive data breach occurred or through what means the hackers accessed the network. It could be the chips that drive the network, often vulnerable to attacks on their operational integrity. It’s no surprise, then, that semiconductor companies ar... » read more

Hypervisors: Help Or Hindrance?


Hypervisors are seeing an increased level of adoption, but do they help or hinder the development and verification process? The answer may depend on your perspective. In the hardware world, system-level integration is rapidly becoming a roadblock in the development process. While each of the pieces may be known to work separately, as soon as they are put together, the interactions between th... » read more

Do More, Earlier


The ARM Cortex-R52 processor is the most advanced processor for functional safety and the first implementation of the ARMv8-R architecture. Along with the announcement of the Cortex-R52, ARM offers a number of development tools to help partners speed up their path to market. This is especially helpful for a new architecture which highlights software separation for safety and security. This arti... » read more

Smartphone Security: For Your Eyes Only


Fans of the Olympics here in the United States were treated to a great Samsung commercial throughout the broadcast. The commercial stars the genius, multi-award-winning actor Christoph Waltz, showing how Americans can multitask with the amazing new Galaxy Note7. Yes, THAT Galaxy Note7. The 90-second long commercial is a delight to watch, but it must have cost Samsung some serious bucks to produ... » read more

The Zen Of Processor Design


Mark Papermaster, chief technology officer at Advanced Micro Devices, sat down with Semiconductor Engineering to discuss how to keep improving performance per watt, new packaging options, and the increasing focus on customization for specific tasks. What follows are excerpts of that conversation. SE: As we get more into the IoT and we have to deal with more data, not to mention cars where da... » read more

Integration IP Helps IP Integration


You might not know much about the MIPI Alliance if you aren't designing mobile phones, but you will soon. Other application areas are taking interest in what this group has accomplished. The alliance was founded in 2003 to create standards for hardware and software interfaces in mobile devices. Successful examples include a camera serial interface (CSI) and a display serial interface (DSI), ... » read more

Smarter Than A Card


Set-top boxes (STBs) were initially secured by Conditional Access System (CAS) smart cards. However, this approach is no longer effective. Smart cards cannot prevent unauthorized access to premium 4K and UHD content, as they are not designed to protect the interface between the card and box, or the STB SoC itself. This is one of the reasons why cardless CAS set-top boxes, equipped with a hardwa... » read more

Auto Security And Technology Questions Persist


While carmakers continue to add increasingly sophisticated driver assist features to new models, semiconductor industry ecosystem players are ramping up their foundation knowledge of what is needed from a technology and security perspective. Fortunately, it appears many existing semiconductor design tools will fit the bill as part of new approaches for automotive design. Mike Stellfox... » read more

Making Drones Secure


Critics have accused drones of creating multiple dangers, including invading privacy, colliding with other aircraft, threatening personal safety and even frightening livestock. Yet the biggest drone threat of all may turn out to be attacks made on the vehicles themselves. Drones, also known as UAVs (unmanned aerial vehicles) and UASs (unmanned aerial systems), need a variety of internal ... » read more

← Older posts Newer posts →